Handbook of biometric anti-spoofing : presentation attack detection /
Saved in:
Edition: | Second edition. |
---|---|
Imprint: | Cham, Switzerland : Springer, 2019. |
Description: | 1 online resource |
Language: | English |
Series: | Advances in computer vision and pattern recognition Advances in computer vision and pattern recognition. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11781042 |
Table of Contents:
- Intro; Foreword; Preface; List of Reviewers; Contents; Contributors; Part I Fingerprint Biometrics; 1 An Introduction to Fingerprint Presentation Attack Detection; 1.1 Introduction; 1.2 Early Works in Fingerprint Presentation Attack Detection; 1.3 Fingerprint Spoofing Databases; 1.4 A Case Study: Quality Assessment Versus Fingerprint Spoofing; 1.5 Approach 1: Fingerprint-Specific Quality Assessment (FQA); 1.5.1 Ridge Strength Measures; 1.5.2 Ridge Continuity Measures; 1.5.3 Ridge Clarity Measures; 1.6 Approach 2: General Image Quality Assessment (IQA); 1.6.1 Full Reference IQ Measures
- 1.6.2 No-Reference IQ Measures1.7 Results; 1.7.1 Results: ATVS-FFp DB; 1.7.2 Results: LivDet 2009 DB; 1.8 Conclusions; References; 2 A Study of Hand-Crafted and Naturally Learned Features for Fingerprint Presentation Attack Detection; 2.1 Introduction; 2.1.1 Related Works; 2.2 Hand-Crafted Texture Descriptors; 2.2.1 Local Binary Pattern; 2.2.2 Local Phase Qunatization; 2.2.3 Binarized Statistical Image Features; 2.3 Naturally Learned Features Using Transfer Learning Approaches; 2.4 Experiments and Results; 2.4.1 Database; 2.4.2 Performance Evaluation Protocol
- 2.4.3 Results on Cooperative Data2.4.4 Results on Non-cooperative Data; 2.5 Conclusions; References; 3 Optical Coherence Tomography for Fingerprint Presentation Attack Detection; 3.1 Introduction; 3.2 Background; 3.2.1 History and Properties of OCT; 3.2.2 Skin Physiology; 3.2.3 Presentation Attack Detection; 3.3 Existing and Ongoing Research; 3.3.1 University of Houston; 3.3.2 Bern University of Applied Sciences; 3.3.3 University of Delaware; 3.3.4 University of Kent; 3.3.5 University of California; 3.3.6 National University of Ireland; 3.3.7 OCT Ingress Project
- 3.3.8 Council for Scientific and Industrial Research3.4 Other Advantages and Future Work; 3.5 Conclusion; References; 4 Interoperability Among Capture Devices for Fingerprint Presentation Attacks Detection; 4.1 Introduction; 4.2 Review of Fingerprint Presentation Attacks Detection Methods; 4.2.1 Fingerprint Reproduction Process; 4.2.2 Liveness Detection Methods; 4.2.3 Software-Based Methods State of the Art; 4.3 The Interoperability Problem in FPAD Systems; 4.3.1 The Origin of the Interoperability Problem; 4.4 Domain Adaptation for the FPAD Interoperability Problem; 4.4.1 Problem Definition
- 4.4.2 Experimental Evidences (PS(X) neqPT(X))4.4.3 Proposed Method; 4.5 Experiments; 4.5.1 Transformation Using Only Live Samples; 4.5.2 Number of Feature Vectors; 4.6 Conclusions; References; 5 Review of Fingerprint Presentation Attack Detection Competitions; 5.1 Introduction; 5.2 Background; 5.3 Methods and Datasets; 5.3.1 Performance Evaluation; 5.3.2 Part 1: Algorithm Datasets; 5.3.3 Part 2: Systems Submissions; 5.3.4 Image Quality; 5.3.5 Specific Challenges; 5.4 Examination of Results; 5.4.1 Trends of Competitors and Results for Fingerprint Part 1: Algorithms